These are beginner CTF questions for the Forensic and Security Technology club at Cal Poly Pomona.
☆30May 8, 2024Updated last year
Alternatives and similar repositories for CTF-Questions
Users that are interested in CTF-Questions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Capsule Routing for Named Entity Recognition☆10Dec 22, 2020Updated 5 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 7 years ago
- All content related to PyData Delhi 2017 - September 2,3 @ IIIT-Delhi☆18Oct 10, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Smart Agent Survey is an application that automates survey response generation by processing survey documents and creating multiple synth…☆12Mar 11, 2026Updated 2 weeks ago
- This is a script to fill out job applications by themselves with your information☆12Apr 20, 2023Updated 2 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- a tiny tool for swf hacking, just browse it:)☆13Mar 12, 2013Updated 13 years ago
- ☆18Aug 14, 2018Updated 7 years ago
- KPMG Cyber Security Challenge 2017 questions repository and writeups☆19Apr 15, 2019Updated 6 years ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated last year
- a crawler for apple AppStore☆19Nov 10, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The implementation of FedBCD algorithm published in the paper "FedBCD: A Communication-Efficient Collaborative Learning Framework for Dis…☆15Jul 2, 2024Updated last year
- ☆18Oct 4, 2020Updated 5 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 4 years ago
- Safe Meeting keeps an eye on you during your video conferences, and if it sees business-inappropriate attire, the video is immediately mu…☆23Jun 2, 2020Updated 5 years ago
- 本研究基于孪生网络和N-way K-shot学习策略,创新提出了一种结合transformer的心电信号分类架构,命名为SMC-Net(Siamese Meta-learning Contrastive Neural Network)。该模型通过孪生网络的结构特性和元学习的…☆18Jun 1, 2024Updated last year
- Qatar university dataset (QUD) is an open access repository, which includes micro-moments power consumption footprints of different appli…☆11Apr 11, 2022Updated 3 years ago
- ☆22Sep 5, 2020Updated 5 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Electronic Health Records storage on a blockchain☆16May 18, 2018Updated 7 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- Vulnerable ASP based Web Application☆18Jan 25, 2019Updated 7 years ago
- Automatic Segment Detection using Unsupervised and Supervised Learning is a system which is designed to detect title and prose segments i…☆24Jul 17, 2020Updated 5 years ago
- Patient-controlled electronic health records platform (EHR)☆20Jun 11, 2021Updated 4 years ago
- Extract annotated misspellings from MIMIC-III.☆13Dec 17, 2020Updated 5 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- From this app, Connect a Phone, Extract any app from It, Decompile, Deobfuscate, Remove Certificate Pinning and Repackage it. Meanwhile, …☆27Sep 26, 2025Updated 6 months ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Shodan Favicon Hash Generator By Aziz Hakim @eternyle☆26May 25, 2024Updated last year
- Probing task; contextual embeddings -> textual definitions (EMNLP19)☆11Apr 22, 2021Updated 4 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Apr 17, 2018Updated 7 years ago
- Information-Gathering Shell Script☆29Oct 17, 2020Updated 5 years ago
- ☆36Jan 22, 2025Updated last year
- Download and load MIMIC-III into a PostgreSQL DB on an Ubuntu VM☆10Jul 3, 2016Updated 9 years ago
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago